Skip to content

Conversation

@zhaomaosu
Copy link
Contributor

@zhaomaosu zhaomaosu commented Mar 25, 2025

Intercept all buffer related API and re-implemented them with device USM,
so that we can get device address and then poison shadow memory before
kernel launch.

@zhaomaosu zhaomaosu force-pushed the support-dev-tsan-sycl-buffer branch from 6655f16 to 092d854 Compare March 25, 2025 05:59
@zhaomaosu zhaomaosu marked this pull request as ready for review March 25, 2025 06:02
@zhaomaosu zhaomaosu requested review from a team as code owners March 25, 2025 06:02
@zhaomaosu
Copy link
Contributor Author

@intel/unified-runtime-reviewers, could you please help review this PR? We need it before feature freeze day. Many thanks.

@zhaomaosu
Copy link
Contributor Author

@pbalcer, any other comments? Thanks.

@zhaomaosu zhaomaosu requested a review from a team March 27, 2025 10:27
@zhaomaosu
Copy link
Contributor Author

@intel/llvm-gatekeepers, this PR is ready to be merged. Thanks.

@martygrant martygrant merged commit fb23663 into intel:sycl Mar 27, 2025
32 checks passed
@zhaomaosu zhaomaosu deleted the support-dev-tsan-sycl-buffer branch March 27, 2025 10:40
KornevNikita pushed a commit that referenced this pull request May 27, 2025
Intercept all buffer related API and re-implemented them with device
USM,
so that we can get device address and then poison shadow memory before
kernel launch.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants